Presentation is loading. Please wait.

Presentation is loading. Please wait.

CMGT 582 Competitive Success/tutorialrank.com

Similar presentations


Presentation on theme: "CMGT 582 Competitive Success/tutorialrank.com"— Presentation transcript:

1 CMGT 582 Competitive Success/tutorialrank.com

2 CMGT 582 Assignment Audit of the HR Department For more course tutorials visit www.tutorialrank.com You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department. Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:

3 CMGT 582 Competitive Success/tutorialrank.com CMGT 582 Week 1 Individual Assignment Getting Involved For more course tutorials visit www.tutorialrank.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Fostering Collective Responsibility for IT Risk" video. Watch the "Balancing Security with User Convenience" video.

4 CMGT 582 Competitive Success/tutorialrank.com CMGT 582 Week 2 Individual Assignment Security Within My Organization For more course tutorials visit www.tutorialrank.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Technology and the Impact on Business and the Environment" Skillsoft video. Complete "Defining law and ethics" point of topic "The Relationship Between Law and Ethics" of the Skillsoft® course "Business Law and Ethics."

5 CMGT 582 Competitive Success/tutorialrank.com CMGT 582 Week 3 Assignment Privacy with Ethics Considerations For more course tutorials visit www.tutorialrank.com Create a 10- to 12-slide presentation evaluating the three areas of privacy issues specific to FERPA, HIPAA, and EEA. Develop scenarios in all of the three areas that you feel are most important to the recipients protected by these laws and the methodology used in each. Include how each of these laws affects the requirements of companies or colleges and how each manages their security strategy to enforce compliance.

6 CMGT 582 Competitive Success/tutorialrank.com CMGT 582 Week 3 Individual Assignment Risk Assessment For more course tutorials visit www.tutorialrank.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "QuickTalks: David Bach: Nonmarket Strategy: The Next Frontier of Competitive Advantage" Skillsoft® video. Complete the "Intrusion Prevention Technologies" topic of the lesson "Understanding IPS Fundamentals" in the Skillsoft® course "Cisco IINS 2.0: Implementing IPS."

7 CMGT 582 Competitive Success/tutorialrank.com CMGT 582 Week 4 Individual Assignment Technologies and Methodologies Evaluation For more course tutorials visit www.tutorialrank.com CMGT 582 Week 4 Individual Assignment Technologies and Methodologies Evaluation Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Creating an Actionable Risk Management Strategy" SkillSoft® video.

8 CMGT 582 Competitive Success/tutorialrank.com CMGT 582 Week 5 Individual Assignment Policy Implementation Presentation For more course tutorials visit www.tutorialrank.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1."

9 CMGT 582 Competitive Success/tutorialrank.com CMGT 582 Week 5 Individual Assignment Policy Implementation course tutorials visit www.tutorialrank.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1." Complete the "Risk Management and Regulatory Compli

10 CMGT 582 Competitive Success/tutorialrank.com CMGT 582 Week 5 Assignment Mitigating Information Management Risk For more course tutorials visit www.tutorialrank.com Consider information security risks, including: Cybercrime and cyber-related crimes Social engineering Mobile computing BYOD (Bring your own device). Write a 3 full page evaluation (not including the title and reference pages) of security technologies and methodologies that can be used to mitigate each of the above information security risks. Support your paper with appropriate references and follow APA format.

11 CMGT 582 Competitive Success/tutorialrank.com CMGT 582 Week 6 Individual Assignment Systems Development Life Cycle (SDLC) For more course tutorials visit www.tutorialrank.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Information Risk Management Overview" topic of the "Information Risk Management Program" lesson of the Skillsoft® course "CISM 2012: Information Risk Management and Compliance (Part 1)." Completethe "Auditing and Testing IS Security"

12 CMGT 582 Competitive Success/tutorialrank.com


Download ppt "CMGT 582 Competitive Success/tutorialrank.com"

Similar presentations


Ads by Google